CS42: Hacked Hosts (CPE: 1.5)

Written by Laura Chappell

Network forensics comes into play in this online courseby Laura Chappell. Based on numerous trace files of breached hosts, Ms. Chappell explains the first steps to identifying suspect traffic patterns. How do you identify a breached host? What are the signs that a bot has invaded your network? How can you find IRC traffic running over port 80, or 25, or 21? What is the first step to dealing with a compromised machine? This online course will get you up to speed on the top items to look for when analyzing the security of your network through network forensics